Accord Contracts Management System
Accord is a Register of Supplier Expenditure and/or Customer Income Contracts.
Accord is a day to day contract management database with individual user homepages to ensure your procurement or finance team are able to work as productively as possible.
Accord makes contract management easy, efficient and compliant.
- Secure Software as a Service Contracts Management
- Reports on Procurement Projects
- Contracts Compliance Database
- Collaborative working environment for teams
- Clear visibility on Expiries, Renewals and End Dates
- Contracts owned by Users under the organisational hierarchy
- Individual team member homepages of tasks and contract status
- Integrated Procurement Projects Tracker OJEU Compliant
- Integrated Spend Analytics tool
- Integrated Facilities Equipment Register & Compliance Database
- Automated Alerts and Escalations to ensure nothing gets missed
- Automated task emails to augment your work flow processes
- One version of the truth around your contracts
- A secure, central place with controlled access via permissions
- Peace of mind that all dates are controlled
- Reduce chase up times and generate longer supplier negotiations
- Gain full visibility of everything to do with your contract
- A CRM tool that provides you with auditable compliance
- Upload specifications, quotations, softcopy contract, SLA etc.
- A smarter way to look at data through Digital Dashboards
£14750 per instance
- Education pricing available
Target Information Systems Limited
07702 248 948
|Software add-on or extension||No|
|Cloud deployment model||Private cloud|
Each deployment of Accord comes with Unlimited Users, Suppliers and Contracts.
The only limit is the initial data storage of 50GB. Additional storage is available on request.
|Email or online ticketing support||Email or online ticketing|
|Support response times||
We replied to 97.7% of support emails with the first hour of fiscal year 2019.
Please see client testimonials: https://www.targetis.co.uk/case-studies/
|User can manage status and priority of support tickets||No|
|Phone support availability||9 to 5 (UK time), Monday to Friday|
|Web chat support||No|
|Onsite support||Yes, at extra cost|
All support matters are to be first raised to the support email: email@example.com.
Target provides application support between the hours of 9.00am and 5.30pm Monday to Friday excluding Bank Holidays.
A support matter emailed to the support email can be followed up with a call in office hours to: 01226 212 056.
Support incidents are split into three priorities:
This is where an application is unavailable and users are unable to access the system. This will be responded to in one hour in business hours and have a resource dedicated to the problem until it is resolved. Target will work 24/7 on this problem until it is resolved.
This is for intermittent, non-critical support matters where the application is available and an error is occurring which does not affect normal usage of the system. Priority two matters will be responded to within four business hours, and typically resolved within 72 hours.
For minor matters such as layout issues, spelling mistakes in graphical text or minor amends; these will either be resolved within seven working days or scheduled for an agreed date/time.
|Support available to third parties||Yes|
Onboarding and offboarding
Accord is configured to follow the established policies, procedures and processes of our clients.
Accord is capable of having data imported from existing databases or spreadsheets.
We also offer Intelligent Hands services, either on-site or off-site, to make the step to Accord as easy as possible for our clients.
|End-of-contract data extraction||Data can be exported at anytime into CSV or TXT files.|
At the end of the contract the client may export any or all data into CSV or Text files.
Exporting into formats for posting to a new database may incurr additional cost.
We make it as easy as possible for our clients when On-Boarding and Off-Boarding.
Using the service
|Web browser interface||Yes|
|Application to install||No|
|Designed for use on mobile devices||Yes|
|Differences between the mobile and desktop service||Views on tablets and Smart phones may be limited due to screen size|
|Description of customisation||
Accord has been developed to be readily configured to meet any customisation needs of its users.
This customisation is scoped at Project Mobilisation and, where required, charged for as a Change Request.
|Independence of resources||Accord is delivered software as a service on high-end hosting with access to powerful CPUs, scaleable server memory and storage.|
|Service usage metrics||Yes|
|Metrics types||Any as required by the client|
|Supplier type||Not a reseller|
|Staff security clearance||Conforms to BS7858:2012|
|Government security clearance||Up to Baseline Personnel Security Standard (BPSS)|
|Knowledge of data storage and processing locations||Yes|
|Data storage and processing locations||
|User control over data storage and processing locations||Yes|
|Datacentre security standards||Complies with a recognised standard (for example CSA CCM version 3.0)|
|Penetration testing frequency||At least once a year|
|Penetration testing approach||‘IT Health Check’ performed by a CHECK service provider|
|Protecting data at rest||Physical access control, complying with SSAE-16 / ISAE 3402|
|Data sanitisation process||No|
|Equipment disposal approach||Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001|
Data importing and exporting
|Data export approach||There is a tool for searching the database and exporting 1 or many records into CSV or TXT.|
|Data export formats||CSV|
|Data import formats||Other|
|Other data import formats||Data imports are managed by Accord at time of mobilisation|
|Data protection between buyer and supplier networks||TLS (version 1.2 or above)|
|Data protection within supplier network||TLS (version 1.2 or above)|
Availability and resilience
|Guaranteed availability||99.9% uptime|
|Approach to resilience||Available on request.|
|Outage reporting||Planned and unplanned outages are communicated to clients via email and followed up with phone calls where appropriate.|
Identity and authentication
|User authentication needed||Yes|
|User authentication||Username or password|
|Access restrictions in management interfaces and support channels||Available on request.|
|Access restriction testing frequency||At least once a year|
|Management access authentication||Username or password|
Audit information for users
|Access to user activity audit information||Users have access to real-time audit information|
|How long user audit data is stored for||User-defined|
|Access to supplier activity audit information||Users have access to real-time audit information|
|How long supplier audit data is stored for||User-defined|
|How long system logs are stored for||User-defined|
Standards and certifications
|ISO/IEC 27001 certification||No|
|ISO 28000:2007 certification||No|
|CSA STAR certification||No|
|Other security certifications||No|
|Named board-level person responsible for service security||Yes|
|Security governance certified||Yes|
|Security governance standards||ISO/IEC 27001|
|Information security policies and processes||Accord is a product of Target Information Systems Limited who operate policies and procedures under ISO27001|
|Configuration and change management standard||Supplier-defined controls|
|Configuration and change management approach||
Configuration of Accord is documented at the time of mobilisation, shared with software engineers and then accepted/rejected by the client under our ISO9001 processes.
Changes are managed through our Change Management Process through requirements gathering, documentation, accept/reject by the client then passed to software engineers who pass changes to the Project Account Manager for testing then back to client for accept/reject under our ISO9001 processes.
|Vulnerability management type||Supplier-defined controls|
|Vulnerability management approach||Available upon request.|
|Protective monitoring type||Supplier-defined controls|
|Protective monitoring approach||Available on request.|
|Incident management type||Supplier-defined controls|
|Incident management approach||Available on request.|
|Approach to secure software development best practice||Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)|
Public sector networks
|Connection to public sector networks||No|
|Price||£14750 per instance|
|Discount for educational organisations||Yes|
|Free trial available||No|